Friday (03.05.2024) the ministry of foreign affairs of the Czech republic issued a press release highlighting the cyberattack carried by Russian actor apt28 on Czechia. The press release reads, “Czechia jointly with Germany, the European Union, NATO and international partners strongly condemns activities of the Russian state-controlled actor APT28, who …
Read More »“Bangladesh cyber security intelligence” (BCSI), As far as known!
While surfing the internet for the regular activities, suddenly found a domain named (bcsi.gov.bd), “Bangladesh cyber security intelligence” (BCSI) in elaborating form. Curious mind wants to know the fact, so deep dive the domain and found a Facebook page also. According to the website, “Bangladesh cyber security intelligence” (BCSI) to …
Read More »Addressing the Critical Cybersecurity Landscape of 2024
The rapid pace of technological transformation presents both extraordinary opportunities and significant risks. Gartner’s authoritative insights into the cybersecurity trends of 2024 underscore the need for organizations to evolve their defensive strategies alongside their digital ambitions. Yesterday, viruses delivered via floppy disks were our primary concern; today, the attack surface …
Read More »CISA Releases Three Industrial Control Systems Advisories
CISA released three advisories about Industrial Control Systems (ICS) on April 30, 2024. These advisories give current security information, vulnerabilities, and exploits related to ICS. ICSA-24-121-01 Delta Electronics CNCSoft-G2 DOPSoft: Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code. ICSA-24-016-01 SEW-EURODRIVE MOVITOOLS MotionStudio (Update A): Successful …
Read More »
CISA
GitLab account takeover bug is actively exploited in attacks
The U.S. federal agency CISA has included CVE-2023-7028 in its Known Exploited Vulnerabilities Catalog. This means that the vulnerability is currently being targeted by attackers. CISA has instructed federal agencies to protect their systems by May 22, giving them a deadline of three weeks. The U.S. cybersecurity agency hasn’t shared …
Read More »Azure Logs utilizing to identify threats: Insights From Microsoft
Microsoft security experts recently conducted an exploration on how to effectively use Azure Logs to identify and counteract threat actions. Azure’s defense mechanism relies on effectively understanding and using logs to hunt for threats. Microsoft focuses on integrating best practices for log management, analysis, and incident response to stay proactive …
Read More »
NCSC
NEW UK LAW BANS DEFAULT PASSWORDS ON SMART DEVICES
The UK’s NCSC wants smart device manufacturers to follow new law banning default passwords. The law, known as the Product Security and Telecommunications Infrastructure act (or PSTI act), will be effective on April 29, 2024. “From 29 April 2024, manufacturers of consumer ‘smart’ devices must comply with new UK law.” …
Read More »U.S. Releases New AI Security Guidelines for Critical Infrastructure
DHS with Cybersecurity and Infrastructure Security Agency (CISA) have released safety and security guidelines to address AI risks that affect the safety and security of critical infrastructure systems in the US. The guidelines analyze system-level risks in three main categories. Attacks Using AI: The use of AI to enhance, plan, …
Read More »Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services
Earlier this week, EPCYBER has identified a large scale network of Chinese botnet as-a-service which consists of various domains, over 20 active telegram groups and other domestic communication channels using Chinese infrastructure. It is evident that the methods and botnet developed and used by the group, successfully bypasses latest DDoS …
Read More »Phoenix Summit 2024: Elevating Cyber security, Impact and Vision
This May, Dhaka, Bangladesh, will host Phoenix Summit 2024, a landmark event in the global cyber security arena. Set from May 23-25, this summit aims to inspire and empower both novices and seasoned enthusiasts in the cyber security field. Why Attend Phoenix Summit 2024? Phoenix Summit is crafted to deliver …
Read More »